MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 f0e9d1f4d3c8bceb62949372616ab9cba3345e691b440e3c94e11e2f8808a823. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 3


Intelligence 3 IOCs YARA File information Comments

SHA256 hash: f0e9d1f4d3c8bceb62949372616ab9cba3345e691b440e3c94e11e2f8808a823
SHA3-384 hash: c4ddf84d4c55a59ef141a5ea8e28a2f522e819ff628f46021ecfcec3df3d50f35173c000abecd9929a62dd5a7fe825ad
SHA1 hash: 49e1033800729572d24335758e69c65448455629
MD5 hash: 74eb35a2a57fe6bb24e8bd9226ae3e28
humanhash: kentucky-jupiter-sodium-freddie
File name:74eb35a2a57fe6bb24e8bd9226ae3e28
Download: download sample
File size:212'992 bytes
First seen:2020-11-17 12:18:24 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 03ae0108c7455c49c94d2d60afa1e57a (1 x Worm.Ramnit)
ssdeep 3072:++Fj9pZnKcSHN4nDU0BzP0uhCOB8rbCoyerIRX9Pk4pLthEjQT6j:zJ9pZnHe+vhCOCrblyerIrkkEj1
Threatray 79 similar samples on MalwareBazaar
TLSH 2E249E05FBA8C787D0F75731A8D78EA50AB9BC51BEF24207A541BB8D1CB27704A953B0
Reporter seifreed

Intelligence


File Origin
# of uploads :
1
# of downloads :
58
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Creating a file in the Windows subdirectories
Running batch commands
Creating a process with a hidden window
Launching the default Windows debugger (dwwin.exe)
Creating a process from a recently created file
Creating a file in the Windows directory
Threat name:
Win32.Trojan.Aenjaris
Status:
Malicious
First seen:
2020-09-30 18:18:33 UTC
AV detection:
27 of 28 (96.43%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
n/a
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Suspicious use of AdjustPrivilegeToken
Program crash
Drops file in Windows directory
Drops file in System32 directory
Loads dropped DLL
Executes dropped EXE
ServiceHost packer
Suspicious use of NtCreateProcessExOtherParentProcess
Unpacked files
SH256 hash:
f0e9d1f4d3c8bceb62949372616ab9cba3345e691b440e3c94e11e2f8808a823
MD5 hash:
74eb35a2a57fe6bb24e8bd9226ae3e28
SHA1 hash:
49e1033800729572d24335758e69c65448455629
SH256 hash:
58b6079327d16aca634bd87d4b6bee562f9b56b9c2ed30c5a419d4cb3e1d90bb
MD5 hash:
b2ad90e44fa9af3e3401249f99e7110f
SHA1 hash:
87744f5ac23983182f3f4b7790805ef4e027d7e2
SH256 hash:
426f938c1bbaab9c9266b1a18c9871cbfebd79ddcb719c4f2bee9bb33d1580e9
MD5 hash:
34d04ff08b29b1ebec7e87caba09c9e3
SHA1 hash:
6e0a42e80f231058a38fdee44e06e8d8cea1c6f0
SH256 hash:
f456cf0d24d5fe977d930dd6a7a5f2db1214fb94707c42aa3818aa0c423d98dd
MD5 hash:
76214c75e956d89d0e106c7fb8cb8da3
SHA1 hash:
9e3986cfce369beceb4edc0107dd71212947566b
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Delivery method
Other

Comments